Vulnerability Details : CVE-2021-37705
OneFuzz is an open source self-hosted Fuzzing-As-A-Service platform. Starting with OneFuzz 2.12.0 or greater, an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance. To be vulnerable, a OneFuzz deployment must be both version 2.12.0 or greater and deployed with the non-default --multi_tenant_domain option. This can result in read/write access to private data such as software vulnerability and crash information, security testing tools and proprietary code and symbols. Via authorized API calls, this also enables tampering with existing data and unauthorized code execution on Azure compute resources. This issue is resolved starting in release 2.31.0, via the addition of application-level check of the bearer token's `issuer` against an administrator-configured allowlist. As a workaround users can restrict access to the tenant of a deployed OneFuzz instance < 2.31.0 by redeploying in the default configuration, which omits the `--multi_tenant_domain` option.
Vulnerability category: BypassGain privilege
Products affected by CVE-2021-37705
- cpe:2.3:a:microsoft:onefuzz:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-37705
0.71%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-37705
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
10.0
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
3.9
|
6.0
|
NIST | |
10.0
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L |
3.9
|
6.0
|
GitHub, Inc. |
CWE ids for CVE-2021-37705
-
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.Assigned by: security-advisories@github.com (Secondary)
-
The product does not properly verify that the source of data or communication is valid.Assigned by: security-advisories@github.com (Secondary)
-
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-37705
-
https://pypi.org/project/onefuzz/
onefuzz · PyPIProduct
-
https://github.com/microsoft/onefuzz/security/advisories/GHSA-q5vh-6whw-x745
Incomplete authorization in multi-tenant deployments · Advisory · microsoft/onefuzz · GitHubThird Party Advisory
-
https://github.com/microsoft/onefuzz/commit/2fcb4998887959b4fa11894a068d689189742cb1
Merge pull request from GHSA-q5vh-6whw-x745 · microsoft/onefuzz@2fcb499 · GitHubPatch;Third Party Advisory
-
https://github.com/microsoft/onefuzz/pull/1153
Fixed an issue with incomplete authorization in multi-tenant deployments by bmc-msft · Pull Request #1153 · microsoft/onefuzz · GitHubPatch;Third Party Advisory
-
https://github.com/microsoft/onefuzz/releases/tag/2.31.0
Release 2.31.0 · microsoft/onefuzz · GitHubRelease Notes;Third Party Advisory
Jump to